Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

Syllabus

Computer and Network Security

Subject Code: ECE-803 L T P: 2 1 0 Credits: 03

I. Introduction
1. Need for Security
2. Security Attacks
3. Services and Mechanisms
4. Network Security
5. Model
II. Symmetric Ciphers
1. Substitution &Transposition Techniques
2. Block Cipher
3. DES
4. Triple DES
5. Stream Ciphers
6. RC4
III. Public Key Cryptography
1. Need and Principles of Public Key Cryptosystems
2. RSA Algorithm
3. Key Distribution and Management
4. Diffie-Hellman Key Exchange
5. Digital Signatures
IV. Authentication
1. Authentication Requirements
2. Message Authentication Codes
3. Hashes
4. MD5 & SHA
5. User Authentication: Password, Certificate based & Biometric Authentication
6. Kerberos
V. Network Security
1. Firewalls
2. IP Security
3. VPN
4. Intrusion Detection
5. Web Security
6. SSL
7. TLS
Text Books:

1. “Cryptography & Network Security”, PHI William Stalling


2. “Cryptography & Network Security”, Mc Graw Hill Atul Kahate
3. “Cryptography & Network Security”, PHI 4 Forouzan

Additional References:

1. "Modern Cryptography, Theory & Practice", Pearson Wenbo Mao


Education.
2. "An Introduction to Mathematical Cryptography", Hoffstein, Pipher, Silvermman.
Springer.
3. "The Design of Rijndael", Springer. J. Daemen, V. Rijmen.
4. "Algorithmic Cryptanalysis", CRC Press. A. Joux
5. "Number Theory", Tata Mc Graw Hill. S. G. Telang
6. "Protocols for Authentication and Key Establishment", C. Boyd, A. Mathuria.
Springer.
7. "Computer Security", Pearson Education. Matt Bishop
8. “Understanding Cryptography”, Springer-Verlag Berlin Christof Paar, Jan Pelzl
Heidelberg

Virtual Laboratories

1. Vlabs, “Cryptography Lab” http://cse29-iiith.vlabs.ac.in/

Course Outcomes:

COs
CO1 Develop Concept of Security needed in Communication of data through computers and
networks along with Various Possible Attacks

CO2 Understand Various Encryption mechanisms for secure transmission of data and
management of key required for required for encryption
CO3 Understand authentication requirements and study various authentication mechanisms

CO4 Understand network security concepts and study different Web security mechanisms.
Module No.
Lectures Videos NPTEL Additional Videos- MIT Additional
Materials
I-INTRODUCTION 1. Need for Security https://nptel.ac.in/cours https://ocw.mit.edu/courses/electri https://ocw.mit.edu/
2. Security Attacks es/106105031/ cal-engineering-and-computer- courses/electrical-
science/6-858-computer-systems- engineering-and-
3. Services and
computer-science/6-
Mechanisms “Cryptography and security-fall-2014/index.htm 857-network-and-
4. Network Security Network Security by “Computer Systems Security by computer-security-
5. Model Debdeep Nickolai Zeldovich & James Mickens, spring-
Mukhopadhyay, IIT MIT” 2014/index.htm
Kharagpur”-Videos and
PDF “Network and
Computer Security
by Prof Ronald
Rivest, MIT”
II-SYMMETRIC 6. Substitution https://nptel.ac.in/cours https://www.youtube.com/channel/ https://ocw.mit.edu/
CIPHERS &Transposition es/106105031/ UC1usFRN4LCMcfIV7UjHNuQg/v courses/electrical-
engineering-and-
Techniques
computer-science/6-
7. Block Cipher “Cryptography and “Introduction to Cryptography by 857-network-and-
8. DES Network Security by Christof Paar, MIT” computer-security-
9. Triple DES Debdeep spring-
10. Stream Ciphers Mukhopadhyay, IIT 2014/index.htm
11. RC4 Kharagpur”
“Network and
Computer Security
by Prof Ronald
Rivest, MIT”
III- 12. Need and https://nptel.ac.in/cours https://www.youtube.com/channel/ https://ocw.mit.edu/
PUBLIC KEY Principles of es/106105031/ UC1usFRN4LCMcfIV7UjHNuQg/v courses/electrical-
CYPTOGRAPHY engineering-and-
Public Key
computer-science/6-
Cryptosystems “Cryptography and “Introduction to Cryptography by 857-network-and-
13. RSA Algorithm Network Security by Christof Paar, MIT” computer-security-
14. Key Distribution Debdeep spring-
and Management Mukhopadhyay, IIT 2014/index.htm
15. Diffie-Hellman Kharagpur”
“Network and
Key Exchange
Computer Security
16. Digital Signatures by Prof Ronald
Rivest, MIT”
IV- 17. Authentication https://nptel.ac.in/cours https://www.youtube.com/channel/ https://ocw.mit.edu/
AUTHENTICATION Requirements es/106105031/ UC1usFRN4LCMcfIV7UjHNuQg/v courses/electrical-
engineering-and-
18. Message
computer-science/6-
Authentication “Cryptography and “Introduction to Cryptography by 857-network-and-
Codes(MAC) Network Security by Christof Paar, MIT” computer-security-
19. Hashes Debdeep spring-
20. MD5 & SHA Mukhopadhyay, IIT 2014/index.htm
21. User Kharagpur”
“Network and
Authentication:
Computer Security
Password, by Prof Ronald
Certificate based Rivest, MIT”
& Biometric
Authentication
22. Kerberos

V- 23. Firewalls https://nptel.ac.in/cours https://ocw.mit.edu/courses/electri https://www.edx.org


NETWORK 24. IP Security es/106105031/ cal-engineering-and-computer- /course/network-
SECURITY security-2
25. VPN science/6-858-computer-systems-
26. Intrusion “Cryptography and security-fall-2014/index.htm
Detection Network Security by “Computer Systems Security by “An eDx Course on
Debdeep Nickolai Zeldovich & James Mickens, Network Security”
27. Web Security
28. SSL Mukhopadhyay, IIT MIT”
29. TLS Kharagpur”
Links to Reading Material (Use your institute mail IDS to access the Google Drive )

https://drive.google.com/open?id=1somShxnVKGgep6pLcvRFfm_KMyrsG0DC

https://drive.google.com/open?id=1xd3RSBl6iEGW2AiZ4lgbb9TdgpfpizP5

https://books.google.co.in/books?id=Kokjwdf0E7QC&printsec=copyright&source=gbs_pub_info_r#v=
onepage&q&f=false

You might also like